IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
 
Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability
sponsored by Dyn
WHITE PAPER: Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Dyn

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. Discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape in this expansive threat report.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Cybersecurity Essentials for 2017
sponsored by Neustar
VIDEO: In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.
Posted: 30 Jan 2017 | Premiered: 25 Jan 2017

Neustar

Mobile Security: The Case for Enterprise Mobility Management
sponsored by Freudenberg IT
WHITE PAPER: Without a dynamic Enterprise Mobility Management (EMM) strategy in place, your company data risks being lost, stolen or otherwise compromised. Learn about the importance of establishing an EMM strategy and explore the multi-level approach your company may need to employ to ensure all your security and compliance demands are met.
Posted: 27 Jan 2017 | Published: 17 Jan 2017

Freudenberg IT

10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe once you adopt cloud services. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

What's The Best Risk Analysis Method for Enterprises?
sponsored by Presidio Networked Solutions
EGUIDE: In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.
Posted: 20 Feb 2017 | Published: 16 Feb 2017

Presidio Networked Solutions

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats Like Ransomware
sponsored by Iron Mountain
EGUIDE: As the threat landscape changes, you need to be able to change with it. In this expert-eguide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Iron Mountain

Threat Intelligence: Your Secret Weapon
sponsored by AlienVault
WHITE PAPER: Within 24 months of a major data loss, 72% of businesses are forced to shut their doors. Learn how SMBs can gain the threat data, intelligence, experience, wisdom, expertise, and focused attention needed to identify and control attacks.
Posted: 03 Feb 2017 | Published: 21 Sep 2016

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement